18
Conclusions ― The Authors state that for secure routing, networks should have security as the goal ― Infiltrators can easily attack, modify or capture vulnerable nodes. ― Limiting the number of nodes, using public/global/local key are some of the ways to counter being attacked by adversaries.

19
Few Observations ― More insight on capturing packets of the air ― Foes or Friends? ― What happens when data is captured, copied and forwarded unnoticed?

20
Few Observations ― What happens if someone spoofs a legitimate node identity and paralyze it. What are the countermeasures? Is it detectable? ― Should sensor networks provide security or is it their goal to be secure?